PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

Size: px
Start display at page:

Download "PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs"

Transcription

1 WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki Intel Labs, Pittsburgh *vivek.2.shrivastava@nokia.com NSDI

2 Enterprise WLAN setting Clients Internet Access Point Wireless controller NSDI

3 Enterprise WLAN setting Clients Functionalities implemented at controller Intrusion detection system Interference management Internet (channel assignment, power control) Access Point Wireless controller NSDI

4 Enterprise WLAN setting Clients Functionalities implemented at controller Intrusion detection system Interference management Internet (channel assignment, power control) Access Point Wireless controller NSDI

5 Problems with wireless* The wireless is being flaky. Flaky how? Well my connection dropped earlier and now it seems to be slow We will take a look. User Wait, now it seems fine. Support *Slide borrowed from Cheng et. al (Jigsaw, Sigcomm 06) NSDI

6 Problems with wireless Hidden terminals 6 6 NSDI

7 Problems with wireless Rate anomaly 6 Mbps 54 Mbps Mismatch in data rates, slows down fast links NSDI

8 Problems with wireless Increasing client density and mobility. 8 8 NSDI

9 Problems with wireless Increasing client density and mobility. 9 9 NSDI

10 Problems with wireless. changing interference patterns NSDI

11 Interference management in WLANs NSDI

12 Interference management in WLANs Estimate Interference dynamically Manage Interference (data scheduling, transmit power control, channel assignment) NSDI

13 Interference management in WLANs Estimate Interference dynamically Manage Interference (data scheduling, transmit power control, channel assignment) NSDI

14 How to estimate interference? Use bandwidth tests NSDI

15 How to estimate interference? AP-Client Use bandwidth tests pair Interferer NSDI

16 How to estimate interference? 1) Measure AP-Client delivery in isolation NSDI

17 How to estimate interference? 1) Measure AP-Client Isolation delivery in isolation delivery= 0.95 NSDI

18 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery NSDI

19 How to estimate interference? 1) Measure AP-Client Interference delivery= 0.66 delivery in isolation 2) Activate interferer and measure delivery NSDI

20 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery Link Interference Ratio (LIR) = del Interference / del isolation NSDI

21 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery Link Interference Ratio (LIR) = 0.66 / 0.95 = 0.69 NSDI

22 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery 0 LIR 1 Strong Weak NSDI

23 But are bandwidth tests practical? Can we use bandwidth tests in live settings Good accuracy Network downtime required - X Not scalable (~ 1 hr for 20 AP-Client pair network) - X Not based on realistic rates and packet sizes X Inefficient in dynamic scenario (client mobility) X NSDI

24 But are bandwidth tests practical? Can we use bandwidth tests in live settings Good accuracy Network downtime required - X Not scalable (~ 1 hr for 20 AP-Client pair network) - X Not based on realistic rates and packet sizes X Inefficient in dynamic scenario (client mobility) X Can we estimate interference in a passive, real-time way? NSDI

25 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

26 Estimating interference passively Sniffer Sniffer NSDI

27 Estimating interference passively Sniffer could be a dedicated wireless radio Clocks synchronized using wired backplane Sniffer Sniffer NSDI

28 Estimating interference passively Sniffer reports NSDI

29 Estimating interference passively Sniffer reports Timestamp, duration, rate, success.. NSDI

30 Estimating interference passively Hidden terminals NSDI

31 Estimating interference passively Hidden terminals NSDI

32 Estimating interference passively Hidden terminals NSDI

33 Estimating interference passively Hidden terminals 1. Carrier sense NSDI

34 Estimating interference passively 1) Note timestamp, Hidden terminals rate, duration 2. Channel free, transmit NSDI

35 Estimating interference passively 1) Note timestamp, rate, duration 2) Note if transmission is a success (ack received?) 3. Collision! NSDI

36 Estimating interference passively Timestamp: T0 Rate: 6Mbps Length: 1400 bytes Success: False Timestamp: T0 + δ Rate: 12Mbps Length: 600 bytes Success: False NSDI

37 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False Interference estimation NSDI

38 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False NSDI

39 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False NSDI

40 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False & NSDI

41 Estimating interference passively Red & T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False & Green clients interfere NSDI

42 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X NSDI

43 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X Red and Green packets overlaps => both lost NSDI

44 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X No overlap, no problem! NSDI

45 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X Both way hidden terminals NSDI

46 Estimating interference passively Infer interference Sniffer reports cenarios eception X X NSDI

47 Estimating interference passively Infer interference Sniffer reports cenarios eception X X Red and Green packets overlaps => Green is lost 47

48 Estimating interference passively Infer interference Sniffer reports cenarios eception X X One way hidden terminals NSDI

49 Computing interference measure in PIE Compute Isolation loss rate Fraction of non-overlapping packets lost Compute Interference loss rate Fraction of overlapping packets lost Interference measure (LIR): (1 Interference loss) / (1 Isolation loss ) NSDI

50 How quickly can PIE converge? Time taken by PIE to converge depends on two key properties Periodicity with which sniffer reports are collected by the controller Traffic patterns for the links which dictate the number of interference events captured in a time interval NSDI

51 How quickly can PIE converge? Time taken by PIE to converge depends on two key properties Periodicity with which sniffer reports are collected by the controller What is the minimum polling period? Traffic patterns for the links which dictate the number of interference events captured in a time interval How much time does PIE take under realistic access patterns? NSDI

52 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

53 What is the minimum polling period? P P P time interval I 1 I 2 Time NSDI

54 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 1 ) R(I 1 ) NSDI

55 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 1 ) R(I 1 ) LIR (I 1 ) NSDI

56 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 2 ) R(I 2 ) LIR (I 1 ) NSDI

57 What is the minimum polling period? P P P time interval I 1 I 2 Time LIR (I 1 ) R(I 2 ) R(I 2 ) LIR (I 2 ). NSDI

58 LIR What is the minimum polling period? Polling period (ms) Stability of interference measure for saturated traffic NSDI

59 LIR What is the minimum polling period? Measure stabilizes after ~85 ms (at least 20 overlap samples) Polling period (ms) Stability of interference measure per polling period NSDI

60 LIR What is the minimum polling period? We use a polling period of 100ms Polling period (ms) Stability of interference measure per polling period NSDI

61 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

62 % of link-interferer pairs How accurate is PIE? Mean Error in LIR estimation 62 62

63 % of link-interferer pairs How accurate is PIE? Mean Error in LIR estimation 63 63

64 % of link-interferer pairs How accurate is PIE? 95% of link-interferer pairs, LIR computed by PIE is within +/- 0.1 of the value reported by BW test Mean Error in LIR estimation 64 64

65 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

66 PIE with realistic access patterns NSDI

67 PIE with realistic access patterns Evaluate PIE using realist traffic patterns on a 15 node topology (7 AP 8 laptops) Each client laptop replays the traffic patterns of an actual client from a real wireless trace Three activity periods: heavy (> 40 % medium busy), medium (40 20% busy), light (< 20% busy) NSDI

68 Time to estimate (ms) PIE with realistic access patterns Heavy Medium Light Traffic period NSDI

69 Time to estimate (ms) PIE with realistic access patterns Convergence is faster for higher client activity 0 Even for light activity, Heavy median Medium time of estimate Light LIR is less than 650 ms Traffic period NSDI

70 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

71 What is the impact on WLAN applications? AP-Client pairs NSDI

72 What is the impact on WLAN applications? AP-Client pairs Evaluate usefulness of PIE for an interference mitigation mechanism (data scheduling using CENTAUR Mobicom 09) NSDI

73 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE NSDI

74 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE 2. Input estimate to a centralized data scheduler NSDI

75 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE 2. Input estimate to a centralized data scheduler 3. Evaluate performance under dynamic scenarios NSDI

76 System Throughput (Mbps) What is the impact on end users? Static Static scenario NSDI

77 System Throughput (Mbps) What is the impact on end users? Static Static scenario NSDI

78 System Throughput (Mbps) What is the impact on end users? Static scenarios, PIE is comparable to BW test Static Static scenario NSDI

79 System Throughput (Mbps) What is the impact on end users? Mobile Mobile scenario NSDI

80 System Throughput (Mbps) What is the impact on end users? Mobile Mobile scenario NSDI

81 System Throughput (Mbps) What is the impact on end users? Mobility scenarios, PIE outperforms BW test Mobile Mobile scenario NSDI

82 What is the impact on end users? PIE can also be used to monitor production systems (like Jigsaw) We monitored two production WLANs Use testbed nodes in proximity of production APs as sniffers Identify hidden terminals and rate anomaly problems NSDI

83 What is the impact on end users? WLANs Hidden terminal cases (LIR < 0.7) Rate anomaly cases (Ratio of rates < 0.2) WLAN1 8% 21% WLAN2 11% 22% NSDI

84 What is the impact on end users? WLANs Hidden terminal cases (LIR < 0.7) Rate anomaly cases (Ratio of rates < 0.2) WLAN1 8% 21% WLAN2 11% 22% Hidden terminals are rare, but can become pain points for clients Rate anomaly is more frequent, but do not cause drastic performance issues NSDI

85 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI

86 Related Work PIE leverages techniques from Jigsaw, WIT (Sigcomm 2006) and builds on their ideas Focus of Jigsaw, WIT was to understand interference, ours is to compute it in real-time CMAP also infers interference to harness exposed terminals, but requires physical layer change Active techniques like Microprobing (CoNext 2008) still require downtime and do not use realistic traffic NSDI

87 PIE Limitations Does not handle non-wifi interferer like microwaves. Can miss external interferers if none of the enterprise APs can listen to the interferer May miss client conflicts, can use client participation in PIE to enhance the system Interference detection techniques at the physical layer may be more accurate in some scenarios where diversity is too low for PIE to function NSDI

88 PIE Summary Online interference estimation important for interference mitigation BW test incurs high overhead, requires downtime PIE is a passive mechanism, generates interference estimates in real time Leverages centralized infrastructure to collect real time reports from APs Non-intrusive with good accuracy NSDI

89 Thank you! NSDI

Diagnosing Wireless Packet Losses in : Collision or Weak Signal?

Diagnosing Wireless Packet Losses in : Collision or Weak Signal? Diagnosing Wireless Packet Losses in 802.11: Collision or Weak Signal? Shravan Rayanchu Arunesh Mishra Dheeraj Agrawal Sharad Saha Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab University

More information

Common problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?

Common problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar? Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Analysis by Carlos Troncoso CS388

More information

Lecture 17: Wireless Networking"

Lecture 17: Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance?

Page 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance? Overview 18-759: Wireless Networks Lecture 15: WiFi Self-Organization Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/

More information

Observing Home Wireless Experience through WiFi APs

Observing Home Wireless Experience through WiFi APs Observing Home Wireless Experience through WiFi APs Ashish Patro* Srinivas Govindan Prof. Suman Banerjee University of Wisconsin Madison *patro@cs.wisc.edu Dense residenfal WLANs today Apartment Building

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

OPTIMIZING ENTERPRISE WIRELESS NETWORKS THROUGH CENTRALIZATION. Vivek Vishal Shrivastava

OPTIMIZING ENTERPRISE WIRELESS NETWORKS THROUGH CENTRALIZATION. Vivek Vishal Shrivastava OPTIMIZING ENTERPRISE WIRELESS NETWORKS THROUGH CENTRALIZATION by Vivek Vishal Shrivastava A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer

More information

A Measurement Study of a Commercial-grade Urban WiFi Mesh

A Measurement Study of a Commercial-grade Urban WiFi Mesh A Measurement Study of a Commercial-grade Urban WiFi Mesh Vladimir Brik Shravan Rayanchu Sharad Saha Sayandeep Sen Vivek Shrivastava Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Measurements in the wireless

Measurements in the wireless Contents Measurements in the wireless Lecture slides for S-38.3183 6.4.2006 Mika Ilvesmäki Motivation Wireless environment spesifics Wireless trace collection Wireless measurement methods Mobility measurements

More information

Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010

Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010 Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses Thomas Claveirole Ph.D. Defense February 26, 2010 Ana Cavalli Reviewer Prof. TÉLÉCOM & Management SudParis Thierry Turletti Reviewer

More information

Detecting Protected Layer-3 Rogue APs

Detecting Protected Layer-3 Rogue APs Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

A Passive Approach to Wireless NIC Identification

A Passive Approach to Wireless NIC Identification A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Rhythm: Achieving Scheduled WiFi Using Purely Distributed Contention in WLANs

Rhythm: Achieving Scheduled WiFi Using Purely Distributed Contention in WLANs Rhythm: Achieving Scheduled WiFi Using Purely Distributed Contention in WLANs Chao-Fang Shih, Bhuvana Krishnaswamy, and Raghupathy Sivakumar Georgia Institute of Technology, Atlanta, GA, USA {cshih,bhuvana,siva}@ece.gatech.edu

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

LAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS

LAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS LAB PROJECT Nº1 REDES MÓVEIS E SEM PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS 1 INTRODUCTION The performance of wireless networks is highly dependent of physical phenomena, such as path loss, shadowing,

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

A Value Aware Approach for Wireless Media Delivery

A Value Aware Approach for Wireless Media Delivery A Value Aware Approach for Wireless Media Delivery Sayandeep Sen Neel Kamal Madabhushi Suman Banerjee University of Wisconsin-Madison Outline Motivation Case Study: Value aware MAC Value aware MAC design

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao and Haitao Zheng U.C. Santa Barbara, Dartmouth College, U.C.

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card IEEE INFOCOM 2004

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card IEEE INFOCOM 2004 Outline INTRODUCTION MOTIVATING SCENARIOS AND BACKGROUND THE MULTINET APPROACH IMPLEMENTATION AND SYSTEM

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

Experimental Evaluation of Large Scale WiFi Multicast Rate Control

Experimental Evaluation of Large Scale WiFi Multicast Rate Control Experimental Evaluation of Large Scale WiFi Multicast Rate Control Varun Gupta*, Craig Gutterman*, Gil Zussman*, Yigal Bejeranoº *Electrical Engineering, Columbia University ºBell Labs, Nokia Objective

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass

More information

Auto-configuration of n WLANs

Auto-configuration of n WLANs Auto-configuration of 802.11n WLANs Mustafa Y. Arslan - Konstantinos Pelechrinis - Ioannis Broustis UC Riverside University of Pittsburgh UC Riverside Srikanth Krishnamurthy - Sateesh Addepalli - Konstantina

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API. Ashish Patro* Prof. Suman Banerjee

COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API. Ashish Patro* Prof. Suman Banerjee COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API Ashish Patro* Prof Suman Banerjee University of Wisconsin Madison *patro@cswiscedu Ashish Patro / COAP / MobiArch 2014 1 Dense

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

LXRS and LXRS+ Wireless Sensor Protocol

LXRS and LXRS+ Wireless Sensor Protocol LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Lecture 17: Wireless Networking

Lecture 17: Wireless Networking Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao and Haitao Zheng U.C. Santa Barbara, Dartmouth College, U.C.

More information

Network Simulators, Emulators and Testbeds

Network Simulators, Emulators and Testbeds Outline Network Simulators, Emulators and Testbeds By: George Nychis Gaurang Sardesai Motivation for Research Different Techniques Simulators Assumptions/Axioms Methods and Results Testbeds Architecture

More information

Enabling TDMA for Today s Wireless LANs

Enabling TDMA for Today s Wireless LANs Enabling TDMA for Today s Wireless LANs Zhice Yang 1 *, Jiansong Zhang 2 *, Kun Tan 2, Qian Zhang 1, Yongguang Zhang 2 1 CSE, Hong Kong University of Science and Technology 2 Microsoft Research Asia *

More information

A and C cant see each other, both send to B RTS/CTS can help

A and C cant see each other, both send to B RTS/CTS can help Virtual carrier sensing Recita,on 8 Wireless Networks First exchange control frames before transmi@ng data Sender issues Request to Send (RTS), incl. length of data Receiver responds with Clear to Send

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks Automating Cross-Layer Diagnosis of Enterprise 802.11 Wireless Networks Yu-Chung Cheng Department of Computer Science & Engineering University of California, San Diego 1 Diagnosing distributed systems

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

On the Performance Characteristics of WLANs: Revisited

On the Performance Characteristics of WLANs: Revisited On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System

More information

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems

More information

An Energy Efficient MAC for Wireless Full Duplex Networks

An Energy Efficient MAC for Wireless Full Duplex Networks An Energy Efficient MAC for Wireless Full Duplex Networks Ryo Murakami, Makoto Kobayashi, Shunsuke Saruwatari and Takashi Watanabe Graduate School of Information Science and Technology, Osaka University,

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

Practical MU-MIMO User Selection on ac Commodity Networks

Practical MU-MIMO User Selection on ac Commodity Networks Practical MU-MIMO User Selection on 802.11ac Commodity Networks Sanjib Sur Ioannis Pefkianakis, Xinyu Zhang and Kyu-Han Kim From Legacy to Gbps Wi-Fi 1999-2003 2009 What is new in 802.11ac? 2013 Legacy

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004

ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ABSTRACT Wireless technology has gained popularity in enterprises

More information

Over-The-Top (OTT) Aggregation Solutions

Over-The-Top (OTT) Aggregation Solutions Over-The-Top (OTT) Aggregation Solutions Omkar Dharmadhikari, Wireless Architect odharmadhikari@cablelabscom CableLabs February 12, 2019 Agenda Introduction Why aggregation is important? Traditional Aggregation

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path

CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path Vivek Shrivastava, Nabeel Ahmed, Shravan Rayanchu Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki, Arunesh

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Enterprise Mobility with Smarter Wi-Fi

Enterprise Mobility with Smarter Wi-Fi Enterprise Mobility with Smarter Wi-Fi Wi-Fi as Ubiquitous Utility to access your Data Martin Šmrha Product Manager, DNS Agenda 1. Introducing Ruckus 2. The Issues with WiFi 3. Technologies 4. Products

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-9 Wireless Fall 1389 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained

More information

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany BIGAP Seamless Handover in High Performance Enterprise IEEE 802.11 Networks Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany Outline Motivation, System Model, Applications, Design

More information

Routing: Collection Tree Protocol. Original slides by Omprakash Gnawal

Routing: Collection Tree Protocol. Original slides by Omprakash Gnawal Routing: Collection Tree Protocol Original slides by Omprakash Gnawal Collection Anycast route to the sink(s) collects data from the network to a small number of sinks network primitive for other protocols

More information

Attack & Defense in Wireless Networks

Attack & Defense in Wireless Networks Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

Etiquette protocol for Ultra Low Power Operation in Sensor Networks Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information